We collect information you provide to us directly when you use the Services.:\n1.1 Sign up, log in, authenticate\n1.1.1 Sign up and Login\na. When you Sign up and log in to our services, to create an account, you must provide the relevant network identification information (avatar, nickname, password). You can choose to fill in your gender, birthday, region, and personal profile to complete your information.At the time,we also store your user account preferences and settings. \nb. You may also use a third-party account to login and use AGEasy Empower, and you will authorize us to obtain public information (avatars, nicknames and other information that you authorize) registered on the third-party platform for binding to AGEasy Empower account so that you can log in directly and use our services.\n1.1.2 Authenticate\nWhen you use a feature or service for authentication (Parenting or Counselor), according to relevant laws and regulations, You may need to provide your real identity information (phone number) or relevant certificate (psychologist qualification) to complete the verification. This information is sensitive to personal information that you may refuse to provide, but you may not be able to access the services without affecting the normal use of other features and services. \n1.2 Information browsing\na. AGEasy Empower may recommend information that you are interested in, and we may collect the necessary log information to achieve this feature.\nb. The log information used for information display includes:\nActions you take when using the Services: click, follow, favorite, search, browse, forward\nInformation you provide on your initiative: feedback, post, like, comment\nGeographical information: Sensor information such as GPS information, Wi-Fi access points, Bluetooth and base stations\nc . The above information we collect and use is de-identified, and data analysis corresponds only to specific, unrelated codes that do not directly relate to your identity and are not associated with your real identity.\n1.3 Function and Interaction\n1.3. 1 Function\na . When you use features related to uploading images, WeChat, Chat and video chat, we will ask you to authorize your camera, photo, microphone. If you refuse, you will not be able to use this feature, but it will not affect the normal use of other features.\nb . When you use an " IoT SIM card" for real-name authentication according to the requirements of laws and regulations, you need to verify your identity through "face recognition" . In the process, the Third Party Certification Agency requires you to provide real name, ID number and facial feature value information. This information is sensitive to personal information that you can refuse to provide without affecting the normal use of other features. This information is only for real-name authentication and purposes specified by laws and regulations and it will not be used for other purposes without your express authorization. \n1.3. 2 Release Information\na. When you post content, comments, questions or answers, we will collect information about your posts and display your nicknames, avatars, and published content.\nb . When you post and select a display location, we will ask you to authorize geographic location permissions and collect location information related to this service. If you refuse to provide accurate geographic location information, you will not be able to use this feature, but it will not affect the normal use of other features.\nc .We collect information you provide to us when you use the services (such as information related to you in comments, messages, post graphics, audio and video).\n1.3. 3 Interactive Communication\na. When you actively follow and interact with the accounts and circles that you are interested in, and browse, comment, collect, like or forward content, we collect the accounts you follow and show you what you care about.\nb. When you add contacts by using the Phone Book, Receipt Address feature, we will request contacts permission and encrypt the information in the address book with an encryption algorithm. Contacts information is sensitive personal information, if you refuse to provide,it will only prevent you from using the Quick Add feature, use of other features on AGEasy Empower would not affect.\n1.4 Search\nWhen you use the search service on AGEasy Empower, we will collect your search keyword information and log records. To provide you an efficient search service, some of the information is temporarily stored on your local storage device and shows you the results and history of what\'s been searched.\n1.5 Safe Operation\n1.5.1 Security Features\nWe are committed to providing you a safe, trusted product and environment,and providing quality and reliable service,and it is our core goal. Information collected to achieve security features is essential.\n1.5.2 Device Information and Log Information\na. To keep your software and services running securely, we collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, Wi-Fi access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, Use, service logs.\nb. To prevent malicious programs and secure operations, we collect installed application information or process information that is running, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.\nc. We may use your account information, device information, service log information, and information that our affiliates and partners may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to you.\n1.6 Changes in the Purpose of Collecting and Using Personal Information\nPlease be aware that as our business grows, changes may be made to the functionality and services provided by us. In principle, when new features or services are relevant to the features or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and use your personal information in a situation where there is no direct or reasonable association with the original processing purpose, and we will inform you again and re-obtain your consent.\n1.7 Exemption From Obtaining Consent To Collect and Use Personal Information\nPlease understand that in accordance with laws and regulations and relevant national standards,we collect and use your personal information without your authorization in the following cases :\na.Those Directly related to national security, national defense security;\nb.Those Directly related to public safety, public health, and major public interests;\nc.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;\nd.Those For the purpose of safeguarding the personal information subject or other personal life, property and other important legal rights and interests which is difficult to obtain an individual\'s consent;\ne. Those The personal information we collect is that you disclose to the public by yourself;\nf. Those Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;\ng. Those Necessary to enter or perform a contract according to your request.;\nh. Those Necessary to maintain the safe and stable operation of the software and related services, such as the detection, disposal of software and related service failures;\ni. Those Necessary for legal news reporting;\nj. Those Academic research institutions need to carry out statistical research or academic research based on the public interest, and de-identifying the personal information contained in the results when the results of academic research or description are provided to the outside world;\nk. Those Other situations as required by laws and regulations.\nPlease be reminded that if the information cannot be personally identified individually or in conjunction with other information, it does not belong to your personal information legally; When it can or we will be able to use data that cannot be linked to any particular personal information in conjunction with other personal information, It will be processed and protected as your personal information in accordance with this Policy during the time we combined these information.\n', title: '1. How we collect and use personal information